Cnki Exp Search Automation
PassAudited by VirusTotal on May 11, 2026.
Overview
Type: OpenClaw Skill Name: cnki-exp-search-automation Version: 0.2.0 The skill bundle provides legitimate automation for searching and extracting metadata from the CNKI (China National Knowledge Infrastructure) academic database. It utilizes standard OpenClaw browser actions and JavaScript snippets to navigate the site, perform advanced searches, and parse result tables. The instructions in SKILL.md are transparent, focusing entirely on the stated purpose of academic research, and include no evidence of data exfiltration, malicious execution, or harmful prompt injection.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If used with your normal browser profile, the automation may act with your existing CNKI or browser session rather than an isolated guest session.
The skill suggests operating through the user's own browser profile. That can reuse existing browser sessions or cookies, but the artifacts do not clearly limit which logged-in accounts or session data the agent may access.
建议设置 profile="user" 使用用户浏览器以便处理验证码
Use a separate browser profile for this skill, log in only to CNKI if necessary, and avoid giving the agent access to your everyday browser profile.
The skill may make repeated requests to CNKI and extract multiple pages of results, which could affect account/site usage if run too broadly.
The skill documents browser automation and page JavaScript evaluation for extracting CNKI results. This is aligned with the purpose, but it can automate bulk page access.
等待结果加载后,使用 snapshot 或 evaluate 提取数据。 ... 批量提取多页结果
Set a clear page limit, keep request rates low, and follow CNKI's terms and access rules.
